2018
DOI: 10.1109/lwc.2017.2776928
|View full text |Cite
|
Sign up to set email alerts
|

Secure Full-Duplex Two-Way Relaying for SWIPT

Abstract: This letter studies bi-directional secure information exchange in a simultaneous wireless information and power transfer (SWIPT) system enabled by a full-duplex (FD) multipleinput multiple-output (MIMO) amplify-and-forward (AF) relay. The AF relay injects artificial noise (AN) in order to confuse the eavesdropper. Specifically, we assume a zeroforcing (ZF) solution constraint to eliminate the residual self-interference (RSI). As a consequence, we address the optimal joint design of the ZF matrix and the AN cov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 13 publications
(18 citation statements)
references
References 21 publications
(36 reference statements)
0
18
0
Order By: Relevance
“…Unfortunately, (P1) is a non-convex optimization problem with respect to the optimization variables (p a , p u , Q) and cannot be easily solved directly. However, using a sequential and iterative technique under a block coordinate approach, we can obtain suboptimal solutions that satisfy the constraints in (4) and (7).…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Unfortunately, (P1) is a non-convex optimization problem with respect to the optimization variables (p a , p u , Q) and cannot be easily solved directly. However, using a sequential and iterative technique under a block coordinate approach, we can obtain suboptimal solutions that satisfy the constraints in (4) and (7).…”
Section: System Modelmentioning
confidence: 99%
“…Developing novel security measures to combat such attacks is therefore of prime interest for many researchers. In this context, the notion of physical layer security has attracted significant attention due to its ability to provide information-theoretic security [4]- [7].…”
Section: Introductionmentioning
confidence: 99%
“…Despite these advances, however, there is still a lack in research on PLS of full-duplex two-way relay (FD-TWR) networks with SWIPT. As an extension of [33], we consider the scenario where all legitimate nodes may be eavesdropped. Specifically, two FD source nodes communicate with each other with the aid of an EH relay in the presence of an eavesdropping node.…”
Section: A Contributionmentioning
confidence: 99%
“…The exact or inexact minorization-maximization methods were developed to solve the sum secrecy rate maximization problem. In [33], it considered the scenario that only the signal of relay node could be eavesdropped, and minimized the total transmit power by an algorithm based on semidefinite programming and 1-D search.…”
Section: Introductionmentioning
confidence: 99%
“…Besides, physical layer security (PLS) secures information in wireless networks without generating secret keys as in encryption techniques [5], and energy harvesting (EH) aims to extend the lifetime of wireless devices [6]. Therefore, secure EH TWR wireless networks, which concurrently exploit PLS, EH, and TWR, have been receiving considerable attention from both industry and academia [7,8].…”
Section: Introductionmentioning
confidence: 99%